Deploying ABAC policies using RBAC systems
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[2] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..
[3] Xin Jin,et al. RABAC: Role-Centric Attribute-Based Access Control , 2012, MMM-ACNS.
[4] Vijayalakshmi Atluri,et al. Efficient Bottom-Up Mining of Attribute Based Access Control Policies , 2017, 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC).
[5] D. Richard Kuhn,et al. Attribute-Based Access Control , 2017, Computer.
[6] Vijayalakshmi Atluri,et al. Toward Mining of Temporal Roles , 2013, DBSec.
[7] David M. Nicol,et al. A framework integrating attribute-based policies into role-based access control , 2012, SACMAT '12.
[8] Vijayalakshmi Atluri,et al. Enforcing Separation of Duty in Attribute Based Access Control Systems , 2015, ICISS.
[9] Ravi S. Sandhu,et al. A model for attribute-based user-role assignment , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[10] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[11] Vijayalakshmi Atluri,et al. The role mining problem: finding a minimal descriptive set of roles , 2007, SACMAT '07.
[12] Vijayalakshmi Atluri,et al. Migrating from DAC to RBAC , 2015, DBSec.
[13] Shamik Sural,et al. Enabling the Deployment of ABAC Policies in RBAC Systems , 2018, DBSec.